ARTICLES

All About India’s First Humanoid Robot Cop

Recently, Kerala Chief Minister inaugurated KP-BOT, first humanoid police robot in Thiruvananthapuram. Read on to know the various functionalities of this interesting humanoid cop... It...

How an Unsecured Server Compromised Millions of Call Recording

A storage unsecured server compromised almost 2.7 million call recording for 6 years. Read on to know about this recent breach... Recently, a storage unsecured...

How ‘AnyDesk’ App Can Steal From Your UPI Based Bank Account

Recently, RBI against downloading and installing 'AnyDesk' app that could empty your bank account in a few minutes. Read on to know more about...

Reality of Cyber-Terrorism Within Cyber Space

A number of terrorist incidents over the past 20 years in various countries have resulted in a large amount of concern, research and action...

NEWS

Threadkit, Formbook Exploit Old Microsoft Vulnerability shows an uptick

E-mail messages are frequently sent over untrusted networks that are outside the organization’s security boundary. When these messages lack any appropriate security safeguards, they...

Fortinet Secures the Path to 5G with Proven Security Architecture and...

Fortinet announces extensive capabilities for securing the path to 5G with its expansive breadth and depth of solutions for mobile core networks and cloud...

January 2019’s Most Wanted Malware: A Significant New Threat Speaks Up

Check Point's researchers detect growth of 'SpeakUp' – a new Linux backdoor which is spreading the XMRig crypto-mining malware Check Point Software Technologies has published...

Google Earth inadvertently leaks Taiwan’s sensitive military sites

Source: Cyware | By Ryan Stewart • Google Earth accidentally leaked Taiwan’s sensitive military locations due to an update in Google’s new 3D maps which...

INTERVIEWS

Understanding The Function of World’s First AI Powered AST Solution

We recently met Mr. Oliver Moradov, Head of Partnerships at NeuraLegion, an Israeli headquartered company with a London office, which has recently innovated a...

Interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security

In an exclusive interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security at Cybertech Israel 2019, shares his view on IBM's implementation of...

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

INDUSTRY INPUTS

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...